Software Alternatives & Reviews
Register   |   Login

Veriato Recon

Veriato Cerebral - Insider Threat Intelligence Platform - provides an end-to-end integrated internal threat security solution.

· Add video · Edit

New Veriato Recon Alternatives

  1. Antivirus and Application Security

  2. Masergy delivers SD-WAN, UC, Managed Security and Cloud Communications solutions to enterprises around the globe.

  3. Duo Security provides cloud-based two-factor authentication. Duo’s technology can be deployed to protect users, data, and applications from breaches, credential theft, and account takeover.

  4. Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively.

    paid

  5. Adaptive authentication is a method to detect and prevent fraudulent transactions across web and mobile applications and protect against unauthorized access to systems.

  6. Experience enterprise-level identity and access management with SecureAuth's powerful, innovative, multi-factor adaptive authentication solutions. Stop bad actors, attackers and criminals from stealing your data!

  7. Zetta delivers enterprise-grade cloud backup and disaster recovery solutions for small and mid-sized enterprises, and MSPs. Zetta DataProtect backs up and syncs full server images directly to the cloud without an appliance or local staging drive.

  8. Use AccessPatrol to block USB and external devices from being accessed on network computers. Solution for Data Loss Prevention and Data Leakage Prevention

    paid Free Trial $229.0 / One-off (5 Users)

  9. Fully protect your data with the comprehensive detection technologies and unified policies of Symantec's industry leading Data Loss Prevention (DLP).

  10. DeviceLock provides DLP solutions protecting organizations from data leak threats.

  11. ThisData is a cloud security company that provides audit and continuous monitoring for data stored in the cloud.

  12. Enterprise-grade identity management for all your apps, users & devices